- KPMG (Philadelphia, PA)
- **Business Title:** Federal Cyber Risk Assessment **Requisition Number:** 117445 - 77 **Function:** Business Support Services **Area of Interest:** ... are, join our team. KPMG is currently seeking a Federal IT Compliance Issues Manager to join our Enterprise...documentation + Review collected evidence for the formal CMMC Assessment , ensuring that it meets the control objectives and… more
- Grant Thornton LLP (Philadelphia, PA)
- …and support to help you excel. From day one, you'll be empowered by the greater Risk team and Cyber team to help clients make the moves that will help ... Grant Thornton is seeking a Cyber Privacy and Data Protection Manager to join...our clients transform and mature their privacy program through assessment , automation, process re-engineering, and managed services. As a… more
- Grant Thornton LLP (Philadelphia, PA)
- As a Cyber Privacy & Data Protection Senior Associate, you will get the opportunity to grow and contribute to our clients' business needs by applying a collection of ... cybersecurity capabilities, including security and privacy, strategy, governance, IT risk , security testing, technology implementation/operations, cybercrime and breach response… more
- Deloitte (Philadelphia, PA)
- … Risk Management Cloud (RMC) modules. Responsibilities will include assessment , design and implementation of Security and Controls. The team:Deloitte's Government ... Are you looking to elevate your cyber career? Your technical skills? Your opportunity for...people, ideas, technology and outcomes-is designed for impact. Serving federal , state, & local government clients as well as… more
- TD Bank (Mount Laurel, NJ)
- …risk and control measurement models and processes + Direct experience with Cyber Risk Quantification methodologies (eg, Factor Analysis of Information Risk ... cyber security standards/requirements, processes and controls (eg, cyber capability/process/control ownership and/or evaluation/ assessment /analysis owner or… more
- Bank of America (Pennington, NJ)
- …that data for various needs Ability to understand data in terms of cyber risk concentration and thematic analysis Advanced Project Management and Reporting ... process, risk , Single Process Inventory, and FLU/CF Risk and Control Self- Assessment related to themes...Skills and ability to work horizontally Foundational (high level) cyber knowledge Demonstrated ability to communicate hard problems in… more
- TD Bank (Mount Laurel, NJ)
- … risk escalation, review and approval processes, data management, policies and risk assessment processes** **Contributes to the monitoring of Key Risk ... premises, technology/ cyber , data and third parties. The** **Senior Group Risk Analyst, Operational Risk -Operational Resilience** **will be part of the… more
- CVS Health (Blue Bell, PA)
- …+ 3+ years experience in IT Audit, Cyber Security assessments, Controls Assessment , Control Validation, Risk Assessment , or Risk Consultant. ... assess design and effectiveness. Key focus areas are technology risk assessments inclusive of cyber security assessments,...to coach experienced IT auditors. + Demonstrated knowledge of risk assessment and familiarity with tools and… more
- Deloitte (Philadelphia, PA)
- …and Risk Management Cloud (RMC) modules. Responsibilities will include assessment , design and implementation of Security and Controls. The team Deloitte's ... Are you looking to elevate your cyber career? Your technical skills? Your opportunity for...people, ideas, technology and outcomes-is designed for impact. Serving federal , state, & local government clients as well as… more
- CSL Behring (King Of Prussia, PA)
- …regulations and policies globally and within the Americas region. 4. Define Data Privacy risk assessment program to assess risk across important sites, ... policies in collaboration with Ethics & Compliance (E&C) and Cyber Security. Establish detailed action plans in compliance to...and frameworks/policies, to report to the DPC. Includes regular assessment of the risk appetite statements and… more
- Humana (Trenton, NJ)
- …governance and improve the data loss prevention capabilities + Lead the Data Risk Assessment Cybersecurity program to identify and manage data security risks ... will be responsible for data protection strategy and execution to improve cyber breach resistance. She/he will be responsible for establishing an enterprise data… more
- Lockheed Martin (King Of Prussia, PA)
- …liaison in support of the security standards and requirements relevant to the NIST Risk Management Framework \(RMF\) Step 1 thru Step 6 for the information systems\. ... a working understanding of the NIST 800\-53 Security and Privacy Controls for Federal Information Systems and Organizations combined with a high degree of technical… more
- GovCIO (Trenton, NJ)
- …examination of requirements, analysis of terms and conditions, and evaluation of risk . Support acquisition activities, to include assessment of requirements, ... nations mission-critical support for their complex requirements. This includes cyber operations, network engineering, software development, C5ISR, mission services,… more
- Nelnet (Trenton, NJ)
- …in accordance with an agreed scope of work. 5. Effectively provide technical risk assessment of technologies in networks, applications, systems, wireless, and ... is responsible for assessing a customer's business and operating environment risk and infrastructure vulnerability posture. This position requires a wide range… more
- Penn Medicine (Philadelphia, PA)
- …routine and sensitive security investigations as well as coordinates investigations with Risk Management., Legal Affairs, Department Heads and local, state and/or ... federal law enforcement agencies + Compile data analytics and...reports as appropriate. This is to include annual security assessment for the PPMC and ambulatory campuses + Coordinate… more
- Vivint (Princeton, NJ)
- …audit department planning activities including scheduling testing and staffing, budget preparation, risk assessment , and other IT audit-related duties as needed. ... + Must have extensive knowledge of IT general controls, cyber security, data privacy, IT operations, and governance. +...development preferred. + Experience working within a COSO / risk -based framework is preferred. + Ability to manage an… more